SCALANCE W User Interface
6.2 Main Window
SCALANCE W1750D UI
54 Configuration Manual, 02/2018, C79000-G8976-C451-02
The
link displays a window for configuring Adaptive Radio Management (ARM) and
Radio features.
●
—Allows you to view or configure channel and power settings for all the APs in the
network.
For information on ARM configuration, see ARM Overview (Page 341).
●
—Allows you to view or configure radio settings for 2.4 GHz and the 5 GHz radio
profiles.
For information on Radio, see Configuring Radio Settings (Page 351).
The
link displays a window with the following tabs:
●
—Use this tab to configure an external RADIUS server for a
wireless network. For more information, see
Configuring an External Server for
Authentication (Page 209).
●
Users for Internal Server
—Use this tab to populate the system’s internal authentication
server with users. This list is used by networks for which per-user authorization is
specified using the internal authentication server of the VC. For more information on
users, see
Managing AP Users (Page 197).
●
—Use this tab to view the roles defined for all the Networks. The Access Rules part
allows you to configure permissions for each role. For more information, see
Configuring
User Roles (Page 266) and Configuring ACL Rules for Network Services (Page 244).
●
—Use this tab to blacklist clients. For more information, see Blacklisting
Clients (Page 235).
●
—Use this tab to enable or disable Application Layer Gateway (ALG)
supporting address and port translation for various protocols and to configure protection
against wired attacks. For more information, see
Configuring ALG Protocols (Page 250)
and Configuring Firewall Settings for Protection from ARP Attacks (Page 251).
●
—Use this tab to enhance the inbound firewall by allowing the
configuration of inbound firewall rules, management subnets, and restricted corporate
access through an uplink switch.
For more information, see Managing Inbound Traffic
(Page 254).
●
—Use this tab to allow or prevent access to a selected list of websites. For
more information, see Configuring Walled Garden Access (Page 194).
●
—Use this tab to configure external captive portal profiles. For
more information, see
Configuring External Captive Portal for a Guest Network
(Page 181).
●
—Use this tab to create a list of URLs that can be blocked
using an ACL rule. For more information, see
Creating Custom Error Page for Web
Access Blocked by AppRF Policies (Page 260).